mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
249 lines
8.8 KiB
JSON
249 lines
8.8 KiB
JSON
{
|
|
"id": "CVE-2010-3714",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2010-10-25T20:01:04.473",
|
|
"lastModified": "2024-11-21T01:19:27.093",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La implementaci\u00f3n de jumpUrl (tambi\u00e9n conocido como seguimiento de acceso) en tslib/class.tslib_fe.php en TYPO3 v4.2.x anteriores a v4.2.15, v4.3.x anteriores a v4.3.7, y v4.4.x anteriores a v4.4.4 no compara de forma adecuada ciertos valores hash durante las decisiones de control de acceso, lo que permite a atacantes remotos leer ficheros de su elecci\u00f3n a trav\u00e9s de vectores no espec\u00edficos.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
|
"baseScore": 7.1,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D93919E9-B3E8-483E-A701-D87570127207"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6B1326B-CB9E-4B40-85BD-05AF52E6A1D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDDEAF6A-8A99-4872-98CC-12BD54515B07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D8185B9-D244-43B3-9DF1-FF137A2108DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FFAD319-DDFC-499F-86AB-141FBE435F6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E068CC16-6995-40C6-BA24-9CA334C4CABB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3B79B49-B4A1-472D-9F6E-BF9ADA3E2EC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26DF36E3-785F-4515-8999-BF48A255907F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F143436A-848B-443F-95E2-B20BC2403CDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB5B21D3-7955-450F-8357-A37905B963B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CC67810-D2C5-4242-ACF2-CF7E9C56D7FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E485652B-FDE0-44C1-83F5-D22B16BEBB34"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3A987C0-51DF-464C-8F4D-03C9CAD256EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "718E405D-4127-4D0E-85BB-83800264AD61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF72642B-8766-44A3-8CB0-D094929AAA6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6066CFA2-202E-43A3-B1DF-36364ABD5A1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13C922A9-05A3-4D98-A568-F780CCA87E39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44E9893A-2771-4C04-9F90-B10EE659088E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31DA3600-C955-46B0-8BD9-C9B3FC0B81EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7ED0C04-33BA-4F9B-97B0-BB5D30C2A0D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E40CC0D-E7EF-4800-AC0B-5AF603B8BC6F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16759F16-34C6-4C2C-BECB-12555EEEBDA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85F02502-5C03-4751-BC83-59F894400E7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9319A96-D510-47DB-9DBC-C16C0947E4C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40E0FDF1-E63C-48C9-98E2-55E3FD891882"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6D22400-E6A1-4C3A-B16F-E14672B86D14"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2010/dsa-2121",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/15856",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/43786",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2010/dsa-2121",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/15856",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/43786",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |